A universally composable secure channel based on the KEM-DEM framework. For ISO standards on public-key encryption, Shoup introduced the framework of KEM (Key Encapsulation Mechanism), and DEM (Data Encapsulation Mechanism), for formalizing and realizing one-directional hybrid encryption; KEM is a formalization of asymmetric encryption specified for key distribution, and DEM is a formalization of symmetric encryption. This paper investigates a more general hybrid protocol, secure channel, using KEM and DEM, such that KEM is used for distribution of a session key and DEM, along with the session key, is used for multiple bi-directional encrypted transactions in a session. This paper shows that KEM semantically secure against adaptively chosen ciphertext attacks (IND-CCA2) and DEM semantically secure against adaptively chosen plaintext/ciphertext attacks (IND-P2-C2) along with secure signatures and ideal certification authority are sufficient to realize a universally composable (UC) secure channel. To obtain the main result, this paper also shows several equivalence results: UC KEM, IND-CCA2 KEM and NM-CCA2 (non-malleable against CCA2) KEM are equivalent, and UC DEM, IND-P2-C2 DEM and NM-P2-C2 DEM are equivalent.

References in zbMATH (referenced in 54 articles )

Showing results 1 to 20 of 54.
Sorted by year (citations)

1 2 3 next

  1. Camenisch, Jan; Derler, David; Krenn, Stephan; Pöhls, Henrich C.; Samelin, Kai; Slamanig, Daniel: Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures (2017)
  2. Bansal, Tarun Kumar; Chang, Donghoon; Sanadhya, Somitra Kumar: Sponge based CCA2 secure asymmetric encryption for arbitrary length message (2015)
  3. Fujisaki, Eiichiro; Okamoto, Tatsuaki: Secure integration of asymmetric and symmetric encryption schemes (2013)
  4. Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi: Certificateless hybrid signcryption (2013)
  5. Fujisaki, Eiichiro: New constructions of efficient simulation-sound commitments using encryption and their applications (2012)
  6. Libert, Beno{^i}t; Paterson, Kenneth G.; Quaglia, Elizabeth A.: Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model (2012)
  7. Naor, Moni; Segev, Gil: Public-key cryptosystems resilient to key leakage (2012)
  8. Yoneyama, Kazuki: One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary (2012)
  9. Paterson, Kenneth G.; Schuldt, Jacob C.N.; Stam, Martijn; Thomson, Susan: On the joint security of encryption and signature, revisited (2011)
  10. Shibuya, Yuki; Shikata, Junji: Constructing secure hybrid encryption from key encapsulation mechanism with authenticity (2011)
  11. Abe, Masayuki; Cui, Yang; Imai, Hideki; Kiltz, Eike: Efficient hybrid encryption from ID-based encryption (2010)
  12. Desmedt, Yvo; Gennaro, Rosario; Kurosawa, Kaoru; Shoup, Victor: A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack (2010)
  13. Herranz, Javier; Hofheinz, Dennis; Kiltz, Eike: Some (in)sufficient conditions for secure hybrid encryption (2010)
  14. Kiltz, Eike; Mohassel, Payman; O’Neill, Adam: Adaptive trapdoor functions and chosen-ciphertext security (2010)
  15. Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong: Efficient CCA-secure PKE from identity-based techniques (2010)
  16. Long, Yu; Chen, Kefei: Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism (2010)
  17. Matsuda, Takahiro; Nakai, Yasumasa; Matsuura, Kanta: Efficient generic constructions of timed-release encryption with pre-open capability (2010)
  18. Wee, Hoeteck: Efficient chosen-ciphertext security via extractable hash proofs (2010)
  19. Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru: Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption (2010)
  20. Yang, Guomin; Tan, Chik How; Huang, Qiong; Wong, Duncan S.: Probabilistic public key encryption with equality test (2010)

1 2 3 next